Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-7584

Publication date:
14/07/2020
A vulnerability has been identified in SIMATIC S7-200 SMART CPU family (All versions >= V2.2
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2020

CVE-2020-7588

Publication date:
14/07/2020
A vulnerability has been identified in Opcenter Execution Discrete (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2020-7587

Publication date:
14/07/2020
A vulnerability has been identified in Opcenter Execution Discrete (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2020-7581

Publication date:
14/07/2020
A vulnerability has been identified in Opcenter Execution Discrete (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2023

CVE-2020-7576

Publication date:
14/07/2020
A vulnerability has been identified in Camstar Enterprise Platform (All versions), Opcenter Execution Core (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2023

CVE-2020-11956

Publication date:
14/07/2020
An issue was discovered on Rittal PDU-3C002DEC through 5.17.10 and CMCIII-PU-9333E0FB through 3.17.10 devices. There is a least privilege violation.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-11953

Publication date:
14/07/2020
An issue was discovered on Rittal PDU-3C002DEC through 5.15.40 and CMCIII-PU-9333E0FB through 3.15.70_4 devices. Attackers can execute code.
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2020

CVE-2020-11955

Publication date:
14/07/2020
An issue was discovered on Rittal PDU-3C002DEC through 5.15.70 and CMCIII-PU-9333E0FB through 3.15.70 devices. There are insecure permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2020

CVE-2020-1948

Publication date:
14/07/2020
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2020

CVE-2020-10045

Publication date:
14/07/2020
A vulnerability has been identified in SICAM MMU (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2020

CVE-2020-10044

Publication date:
14/07/2020
A vulnerability has been identified in SICAM MMU (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2020

CVE-2020-15720

Publication date:
14/07/2020
In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation. Since the verify parameter was hard-coded in all request functions, it was not possible to override the setting. As a result, tools making use of this class, such as the pki-server command, may have been vulnerable to Person-in-the-Middle attacks in certain non-localhost use cases. This is fixed in 10.9.0-b1.
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2020